Term
Tom started the process of selecting a new system for the firm and he is weighing all of the various issues that need to be considered and the resources he has at his disposal as he makes this important decision.
As Tom prepares to remove the field in his selection of a new system, he wants a quick refresher on the difference between a request for proposal (RFP) and a request for quotation (RFQ). If he needs a request for proposal (RFP), Simone will write it, and if he needs an RFQ, Marny is responsible for writing that. Which of the following is true?
• An RFP that Simon writes is more specific than an RFQ will write • RFPs and RGQs have very different objectives • When Simone is tasked with the job, Tom Already knows the specific product or service he wants and he needs to obtain price quotations or bids. • When Marny is tasked with the job, her output can involve outright purchase or a variety of leasing options. |
|
Definition
When Simone is tasked with the job, Tom Already knows the specific product or service he wants and he needs to obtain price quotations or bids. |
|
|
Term
A secure system includes _____ that can log every instance of data entry and changes.
• Control trails • Trap trails • Audit trails • Batch trails |
|
Definition
|
|
Term
To produce a control break report, the records must be arranged, or sorted, in _____. • Control field order • Subgroup field order • Control break order • Character break order |
|
Definition
|
|
Term
When determining outsourcing fees, a _____ uses a set fee based on a specified level of service and user support. • Subscription model • Fixed fee model • Transaction model • Usage model |
|
Definition
|
|
Term
Some forms use a _____ that contains icons or buttons that represent shortcuts for executing common commands. • Dialog box • Toolbar • Menu box • Taskbar |
|
Definition
|
|
Term
Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity. • True • False |
|
Definition
|
|
Term
_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data. • Standardization • Encapsulation • Normalization • Encryption |
|
Definition
|
|
Term
The _____ environment enhances interactive experiences, including wikis and blogs, and social networking applications. • Software as a Service (SAAS) • Web 2.0 • Command-line • Outsourcing |
|
Definition
|
|
Term
A(n) _____ displays only those records that meet a specific condition or conditions. • Summary report • Exigency report • Exception report • Detail report |
|
Definition
|
|
Term
In _____, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues. • Design prototyping • Layout prototyping • Command prototyping • System prototyping |
|
Definition
|
|
Term
EBCDIC and ASCII both require _____ bits for storage of each character. • Sixteen • Twelve • Eight • Six |
|
Definition
|
|
Term
A common field is an attribute that appears in only one entity. • True • False |
|
Definition
|
|
Term
_____ is an online data entry method, where a blank form that duplicates or resembles the source document is completed on the screen. • Form pulling • Form resetting • Form filling • Form uploading |
|
Definition
|
|
Term
_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers. • Unicode • ISO (International Organization for Standardization) • EBCDIC (Extended Binary Coded Decimal Interchange Code) • ASCII (American Standard Code for Information Interchange) |
|
Definition
EBCDIC (Extended Binary Coded Decimal Interchange Code) |
|
|
Term
A _____ is a set of letters or numbers that represents a data item. • Code • Business glossary • Data dictionary • Mnemonic |
|
Definition
|
|
Term
Input _____ is a template or pattern that restricts data entry and prevents errors. • Key • Pattern • Mask • Legend |
|
Definition
|
|
Term
The _____ of a project is the total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur. • Return on investment (ROI) • Acquisition process • Payback analysis • Net present value (NPV) |
|
Definition
|
|
Term
____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data. • Java virtual connector (JVC) • ActiveX data object (ADO) • Open embedded connectivity (OEC) • Open database connectivity (ODBC) |
|
Definition
Open database connectivity (ODBC) |
|
|
Term
Migrating a traditional database design to the web can require design modification, additional software, and some added expense. • True • False |
|
Definition
|
|
Term
Which of the following is true of a traditional systems development environment? • Systems design is influenced by compatibility • Systems often utilize Internet links and resources • Systems are designed to run local and wide-area company networks • Systems applications require fewer desktop computing power and resources |
|
Definition
•Systems design is influenced by compatibility •Systems often utilize Internet links and resources •Systems are designed to run local and wide-area company networks |
|
|
Term
Empowerment makes an IT department less productive because it must spend more time responding to the daily concerns of users and less time on high-impact systems development projects that support strategic business goals. • True • False |
|
Definition
|
|
Term
Three main types of relationships can exist between entities: a one-to-one relationship, abbreviated 1:1; a one-to-many relationship, abbreviated 1:M; and a many-to-many relationship, abbreviated M:N. • True • False |
|
Definition
|
|
Term
Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of _____. • Four digits for the year, two for the month, and two for the day (YYYYMMDD) • Four digits for the year, two for the month, and four for the day (YYYYMMDDDD) • Two digits for the year, two for the month, and two for the day (YYMMDD) • Two digits foe the day, two for the month, and four for the year (DDMMYYYY |
|
Definition
Four digits for the year, two for the month, and two for the day (YYYYMMDD) |
|
|
Term
In a source document, the main part of a form, called the _____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data. • Instruction zone • Body zone • Heading zone • Authorization zone |
|
Definition
|
|
Term
_____ is strictly hardware-related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device. • Virtual storage • Simulated storage • Logical storage • Physical storage |
|
Definition
|
|
Term
_____ is the starting point for measuring the performance, accuracy, and completeness of the finished system before entering the systems design phase. • Maintenance agreement • Software license • Request for quoting document • Software requirements specification |
|
Definition
Software requirements specification |
|
|
Term
IBM describes WebSphere as a software platform for _____ environments. • Service-orientated • Integrated development • Integrated development • Business process outsourcing |
|
Definition
|
|
Term
A(n) _____ does not distract a user and calls no attention to itself. • Pellucid interface • Transparent interface • Translucent interface • Opaque interface |
|
Definition
|
|
Term
In most large and medium-sized companies, a(n) _____ within the IT department is responsible for providing user support. • Evaluation team • Planning center • Service desk • Planning center |
|
Definition
|
|
Term
For upper-level managers who often want to see total figures and do not need supporting details, a(n) _____ is appropriate. • Exigency report • Detail report • Exception report • Summary report |
|
Definition
|
|
Term
_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise. • Scalability • Compatibility • Cardinality • Functionality |
|
Definition
|
|
Term
The _____, which appears at the beginning of a report, identifies the report and contains the report title, date, and other necessary information. • Report header • Character head • Control head • report footer |
|
Definition
|
|
Term
A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form. • 30 • 12 • 32 • 24 |
|
Definition
|
|
Term
Which of the following is true of web-based development? • Web-based software treats the software as a product that is more dependent on he desktop computing powers and resources • Web-based software usually requires middleware to communicate with existing software and legacy systems • When companies acquire web-based software as a service rather than a product purchase, they can limit in-house involvement to a minimum • Web-based systems can run on multiple hardware environments |
|
Definition
•Web-based software usually requires middleware to communicate with existing software and legacy systems •When companies acquire web-based software as a service rather than a product purchase, they can limit in-house involvement to a minimum •Web-based systems can run on multiple hardware environments |
|
|
Term
In a source document, the _____ contains codes, identification information, numbers, and dates that are used for storing completed forms. • Heading zone • Control zone • Totals zone • Authorization zone |
|
Definition
|
|
Term
Interface design should call for attention to the interface, rather than facilitating design objectives. • True • False |
|
Definition
|
|
Term
Eamon is planning to start an online store that specializes in books and electronics. Since it’s his first business, he has a lot of doubts. Help Eamon set up his business by answering the following questions.
Eamon plans to operate three warehouses, in different cities, to support his business. To find the exact location of a product, he wants to establish a code that identifies a product’s warehouse location, floor number, section number, aisle number, and bin number. By doing this, he can ship the ordered products faster. Which of the following codes would you suggest Eamon to use? • Significant digit code • Block sequence code • Action code • Sequence code |
|
Definition
|
|
Term
A _____ describes the actual processes of entering, verifying, and storing data; the physical layout of data files and sorting procedures, the format of reports, and so on. • Logical design • Physical design • Qualitative design • Quantitative design |
|
Definition
|
|
Term
To create an attractive user interface layout and design, when the user enters data that completely fills the field, the data must move automatically to the next field. • True • False |
|
Definition
|
|
Term
Audit log files, which record details of all accesses and changes to a file or database, can be used to recover changes made since the last backup. • True • False |
|
Definition
|
|
Term
A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities. • Hash topology notation • Big O notation • Dark resistor’s notation • Crow’s foot notation |
|
Definition
|
|
Term
_____ combine data from different item attributes, or characteristics, to build a code. • Significant digit code • Derivation code • Sequence code • Category code |
|
Definition
|
|
Term
Siobhan is going to create a dialog box for a new application and while she has been a user of dialog boxes for a long time, she has never before taken the time to learn the names of the actual dialog box features aligned with their functions.
If Siobhan has a dialog box option that is either on or off, which of the following is she most likely to use? • Toggle button • Drop-down list box • List box • Text box |
|
Definition
|
|
Term
A _____ system allows a customer to request a fax using email, via the company website or by telephone. • Turnfax • Frontfax • Digifax • Faxback |
|
Definition
|
|
Term
Which of the following is a software collection obtained from a vendor or application service provider? • Software package • Software aggregate • Software cluster • Software metric |
|
Definition
|
|
Term
In an entity-relationship diagram, entities are commonly represented as _____. • Rectangles • Circles • Hexagons • Triangles |
|
Definition
|
|
Term
When determining outsourcing fees, a _____ has a variable fee based on the number of users or workstations that have access to the application. • Usage model • Subscription model • Fixed fee model • Transaction model |
|
Definition
|
|
Term
The data mining technique that relies on association rule learning is often called _____. • Strategy-orientated analysis • Market basket analysis • Simulated analysis • Virtual storage analysis |
|
Definition
|
|
Term
A(n) _____ is a data validation rule that is used for applying to mandatory data items. • Asynchronic check • Range check • Sequence check • Existence check |
|
Definition
|
|
Term
Companies use various _____ methods to maintain output integrity and security. • Output data • Output aesthetic • Output control • Output stream |
|
Definition
|
|
Term
Web-based software usually requires additional layers, called _____, to communicate with existing software and legacy systems. • Shareware • Freeware • Public domain software • Middleware |
|
Definition
|
|
Term
Sensitive data can be encrypted, or coded, so only users with decoding software can read it. • True • False |
|
Definition
|
|
Term
Which of the following are the advantages of a DBMS (database management system)? • Database systems can support enterprise-wide applications more effectively than file processing systems. • A DBMS is scalable which makes it easier to meet the rapidly changing needs of the business • Systems that interact with DBMS are relatively dependent of how the physical data is maintained • Effective database administration helps ensure that standards for data names, formats, and documentation are followed uniformly throughout an organization |
|
Definition
•Database systems can support enterprise-wide applications more effectively than file processing systems. •A DBMS is scalable which makes it easier to meet the rapidly changing needs of the business •Effective database administration helps ensure that standards for data names, formats, and documentation are followed uniformly throughout an organization |
|
|
Term
Betty has a number of report templates at her disposal filed in folders to respond to her boss's requests. In order to know where to find a report that meets the needs of her manager, she first needs to know what category of report will satisfy the request.
Betty's lead needs to get a report of all of the purchases made only by his employees, using their employee discount, in a given week. In which of the following folders is she likely to find this category of report? • Detail reports • Control reports • Summary reports • Exception reports |
|
Definition
|
|
Term
In a traditional systems development environment, security issues usually are less complex than with web-based systems, because the system operates on a private company network, rather than the Internet. • True • False |
|
Definition
|
|
Term
In a(n) _____, the web becomes an integral part of the application, rather than just a communication channel, and systems analysts need new application development tools and solutions to handle the new systems. • File-based system • Agent-based system • Quality-based system • Internet-based system |
|
Definition
|
|
Term
A software package that can be used by many different types of organizations is called a(n) _____. • Symmetric application • Asymmetric application • Vertical application • Horizontal application |
|
Definition
|
|
Term
Building an application in a _____ environment can offer greater benefits, and sometimes greater risks, when compared to a traditional environment. • Multinational • GUI • Cloud • Web-based |
|
Definition
|
|
Term
Benchmark tests must precisely match the day-to-day situation at your company. • True • False |
|
Definition
|
|
Term
A _____ is a data validation rule that identifies values that are questionable, but not necessarily wrong. • Sequence check • Reasonableness check • Validity check • Range check |
|
Definition
|
|
Term
One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems. • Combinatorial integrity • Foreign integrity • Candidate integrity • Referential integrity |
|
Definition
|
|
Term
In _____, systems analysts use prototyping to verify user requirements, after which the prototype is discarded and implementation continues. • Throwaway prototyping • Application prototyping • System prototyping • Design prototyping |
|
Definition
•Throwaway prototyping •Design prototyping |
|
|
Term
A subscription model charges a variable fee based on the volume of transactions or operations performed by the application. • True • False |
|
Definition
|
|
Term
A web-based data design requires users to have powerful workstations. • True • False |
|
Definition
|
|
Term
A _____ improves input quality by testing the data and rejecting any entry that fails to meet specified conditions. • Data requirement rule • Data validation rule • Data mining rule • Data load rule |
|
Definition
|
|
Term
Nearly _____ percent of total costs occur after the purchase of hardware and software. • 95 • 80 • 15 • 45 |
|
Definition
|
|
Term
If a software package is purchased, consider a _____, which offers additional support and assistance from the vendor. • Request for proposal • Software license • Fixed fee model • Supplemental maintenance agreement |
|
Definition
Supplemental maintenance agreement |
|
|
Term
User-selected help always offers assistance for a task in progress. • True • False |
|
Definition
|
|
Term
A user interface (UI) is the key to _____, which includes user satisfaction, support for business functions, and system effectiveness. • Abstraction • Testability • Usability • Encapsulation |
|
Definition
|
|
Term
_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard. • Java eclipse framework connectivity (JEFC) • Java runtime environment (JRE) • Java database connectivity (JDBC) • Java virtual machine (JVM) |
|
Definition
Java database connectivity (JDBC) |
|
|
Term
Which of the following is a guideline for the design of data entry screens that are easy to learn and use? • Provide a descriptive caption for every field • Display a default value when a field value will be constant for successive records • Require users to type leading zeros for numeric fields • Restrict user access to screen locations where data is entered |
|
Definition
•Provide a descriptive caption for every field •Display a default value when a field value will be constant for successive records •Restrict user access to screen locations where data is entered |
|
|
Term
_____ describes the relationship between computers and the people who use them to perform their jobs. • Media control interaction (MCI) • Peripheral connect (PC) • Human-computer interaction (HCI) • Peripheral component interconnect (PCI) |
|
Definition
Human-computer interaction (HCI) |
|
|
Term
A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key. • Zeroth normal form • Second normal form • Third normal form • Fourth normal form |
|
Definition
|
|
Term
Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember. • Rhapsodic • Harmonic • Sequence • Mnemonic |
|
Definition
|
|
Term
_____ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. • Utility computing • Mainframe computing • Grid computing • Cloud computing |
|
Definition
|
|
Term
_____ is the process of creating table designs by assigning specific fields or attributes to each table in a database. • Normalization • Encryption • Encapsulation • Abstraction |
|
Definition
|
|
Term
A(n) _____ allows a user to specify a task without specifying how the task will be accomplished. • Query by example language • Imperative language • Query language • Procedural language |
|
Definition
|
|
Term
Using batch input, data entry is performed continuously. • True • False |
|
Definition
|
|
Term
A _____ controls database operations, including storing, retrieving, updating, and deleting data. • Data definition language • Data device language • Data query language • Data manipulation language |
|
Definition
Data manipulation language |
|
|
Term
_____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity. • Compatibility • Cardinality • Scalability • Functionality |
|
Definition
|
|